Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhoNTUtMmZxcC1wNzc1
Command injection in mail agent settings
Impact
Command injection in mail agent settings
Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
Permalink: https://github.com/advisories/GHSA-xh55-2fqp-p775JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhoNTUtMmZxcC1wNzc1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-xh55-2fqp-p775, CVE-2021-37708
References:
- https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775
- https://nvd.nist.gov/vuln/detail/CVE-2021-37708
- https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa
- https://github.com/advisories/GHSA-xh55-2fqp-p775
Affected Packages
packagist:shopware/core
Dependent packages: 163Dependent repositories: 298
Downloads: 2,302,339 total
Affected Version Ranges: <= 6.4.3.0
Fixed in: 6.4.3.1
All affected versions:
All unaffected versions: 6.0.0, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.2.0, 6.2.1, 6.2.2, 6.2.3
packagist:shopware/platform
Dependent packages: 6Dependent repositories: 38
Downloads: 1,088,737 total
Affected Version Ranges: <= 6.4.3.0
Fixed in: 6.4.3.1
All affected versions:
All unaffected versions: 5.3.1, 6.0.0, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.2.0, 6.2.1, 6.2.2, 6.2.3